This program affords a vista on several critical political and national security landscapes, including the use of nuclear power plants as an economic weapon and sabotaged via physical interdiction or cyber-interference.

After examining a supposed “Russian-meddling” incident which was actually an ANTI-Russian incident to use Ukrainian nuclear power plants to supersede the old Soviet power grid in former republics of the U.S.S.R., we note the continued dominance of the Ukrainian political landscape by virulent fascists evolved from the World War II era OUN/B.

We conclude with a terrifying look at the possibility that the sabotaging/hacking of nuclear power plants could lead to a Third World War.

With the media and political establishments turning handsprings over “Russia-gate,” we examine in detail one of the incidents prominent in the presentation of the supposition that “our democracy” was manipulated by the Russians.

In late January, Trump point man for “matters Russian”–CIA/FBI operative Felix Sater, a long-time associate of his and Trump’s lawyer Michael Cohen and a Ukrainian parliamentarian named Andrii Artemenko were proposing a cease-fire/peace plan for Ukraine. This has been spun by our media as constituting yet another of the “Russia controls Trump” manifestations.

The facts, however, reveal that this was not a “pro-Russian” gambit but an ANTI-Russian gambit! In addition to the CIA/FBI affiliation of Sater, it should be noted that Artemenko was part of the Pravy Sektor milieu in Ukraine, one of the most virulent of the OUN/B successor organizations in power in that benighted nation.

Sater, Artemenko and others were working on a plan to rehabilitate Ukrainian nuclear power plants in order to generate electricity for Ukraine and the Baltic states, freeing those former Soviet republics from their old Soviet electrical power grids. The aging Soviet grids are a remaining element for potential Russian influence in these areas.

Andrii Artemenko:

1.-” . . . is a populist politician with ties to the far-right Ukrainian military-political group “Right Sector” and a member of the pro-Western opposition parliamentary coalition led by former Prime Minister Yulia Tymoshenko’s party. . . .. . . . Artemenko, who is a staunch ally of Valentyn Nalyvaichenko, a former head of Ukraine’s security service with lofty political ambitions, has aligned himself with other West-leaning populists like Tymoshenko. . . .”
2.-” . . . . has a wife who is a model, he served 2.5 years in prison without a trial, he has business in U.S and he is involved in the military trade to the war zones in the Middle East. At home, he has close ties with the ultra-nationalistic Right Sector. . . .”
3.-” . . . according to his previous e-declaration in 2015, Artemenko has a wife, model Oksana Kuchma and four children, including two with U.S. citizenship — Edward Daniel, Amber Katherine. . . .”
4.-” . . . . founded several companies that provided military logistics services into the conflict zones and traveled to Saudi Arabia, Syria, and Qatar for business trips. . . .”
5.-” . . . . is the deputy head of the European Integration Committee and responsible for diplomatic connections with Saudi Arabia, Qatar, United States, Kuwait, Lithuania and Belarus. . . .”
6.-” . . . . joined the Right Sector political party and was rumored to be one of the sponsors of its leader, Dmytro Yarosh, during his presidential election campaign in 2014. There is even a photo of Artemenko, seating among the Right Sector Party founders at the first party meeting in March 2014. Right Sector spokesperson Artem Skoropadsky told the Kyiv Post on Feb. 20 that he couldn’t confirm or deny whether Artemenko financed the Right Sector Party. . . .”

Anything but a “pro-Russian” agent. Again, he was working with Trump point man for matters Russian Felix Sater on this deal to provide nuclear-generated electricity to some former Soviet republics. Again, an anti-Russian plot, NOT a pro-Russian plot!

Next, we note that June 30th has been established as a commemorative celebration in Lvov [Lviv]. It was on June 30, 1941, when the OUN-B announced an independent Ukrainian state in the city of Lviv. That same day marked the start of the Lviv Pograms that led to the death of thousands of Jews.

The holiday celebrates Roman Shukhevych, commander of the Nachtigall Battalion that carried out the mass killings. The city of Lviv is starting “Shukhevychfest” to be held in Lviv on June 30th, commemorating the pogrom. Shukhevych’s birthday. Shukhevych was named a “Hero of the Ukraine” by Viktor Yuschenko.

In past posts and programs, we have discussed Volodomir Vyatrovich, head of the Orwellian Institute of National Remembrance. He defended Shukhevych and the public displaying of the symbol of the Galician Division (14th Waffen SS Division.)

Returning to Sater collaborator Andrii Artemenko, we note that he is part of push by Pravy Sektor and other OUN/B successor organizations in Ukraine to oust Poroshenko.

A major, terrifying part of the program focuses on nuclear power plants, the physical and/or cyber sabotaging of those plants and the possibility that this could lead to a Third World War. Against the background of the drumbeat of anti-Russian propaganda to which we are being subjected, the charge that “Russian hackers” attempted to gain access to U.S. nuclear power plants using a spearfishing attack is to be viewed with alarm.

“. . . . The Washington Post reported Saturday that U.S. government officials have already pinned the recent nuclear cyber intrusions on Russia. . . . Analysts remain quick to tamp down assertions that Russia’s fingerprint on the latest attack is a sure thing. . . . Still, it’s a pretty alarming situation regardless of who was behind it, in part because it’s an example of how potentially vulnerable things like nuclear plants are to any hacker, state-backed or not: . . . . Still, the source said a well-resourced attacker could try sneaking in thumb drives, planting an insider or even landing a drone equipped with wireless attack technology into a nuclear generation site. Reports indicate that the infamous Stuxnet worm, which damaged Iranian nuclear centrifuges in the late 2000s, probably snuck in on removable media. Once inside the “air gapped” target network, Stuxnet relied on its own hard-coded instructions, rather than any remote commands sent in through the internet, to cause costly and sensitive nuclear equipment to spin out of control. . . .”

The above-excerpted story should be viewed against the background of a frightening development in Florida. Devon Arthurs – a neo-Nazi-turned-Muslim–murdered two of his neo-Nazi roommates back in May. National Guard soldier Brandon Russell – Arthurs’s surviving third roommate, was found with bomb-making materials, radioactive substances and a framed picture of Timothy McVeigh after police searched their residence.

Russell:

1.-Planned to sabotage a nuclear power plant. ” . . . . He said Russell studied how to build nuclear weapons in school and is ‘somebody that literally has knowledge of how to build a nuclear bomb.’ . . . He also said they had a plan to fire mortars loaded with nuclear material into the cooling units of a nuclear power plant near Miami. He said the damage would cause ‘a massive reactor failure’ and spread ‘irradiated water’ throughout the ocean. . . .”
2.-Belonged to a Nazi group called “Atomwaffen.” ” . . . The FBI said Russell “admitted to his neo-Nazi beliefs” and said he was a member of a group called Atomwaffen, which is German for ‘atomic weapon.’ . . .”
3.-Was in the National Guard. Recall that, in the Nazi tract Serpent’s Walk, the Underground Reich gains control of the opinion-forming media, infiltrates the U.S. military and takes over the country after it is devastated by a series of terrorist incidents involving Russian WMDs. The stage is set for a Nazi flase flag operation that could be blamed on Russia.

Russell, and the rest of Atomwaffen, received a wringing endorsement from brilliant Nazi hacker Andrew Auerenheimer. Auernheimer is a skilled hacker who may very well have the ability to trigger a nuclear melt down someday. Writing of the murder of Russell’s roommates Auernheimer, the two killed roommates were “friends of friends” and the “Atomwaffen are a bunch of good dudes. They’ve posted tons of fliers with absolutely killer graphics at tons of universities over the years. They generally have a lot of fun and party.”

The point, here, is that Auerenheimer is part of the Nazi milieu that was looking to sabotage a nuclear power plant. With our media hyping “Russian hacking,” including the supposed attempt to hack U.S. nuclear power plants, the propaganda stage is set for someone with Auerenheimer’s formidable computer skills to sabotage a nuke plant, thereby [very possibly] starting World War III.

This post concludes with a detailed article referred to briefly at the end of the broadcast. It delves into the technically complicated discussion about the high-profile hacks.

Against the background of the reports of Russian hacking of U.S. nuclear power plants, the “Atomwaffen” link to Ukraine-based Andrew Auerenheimer, writer Jeffrey Carr’s reflections are to be weighed very seriously:

” . . . . Here’s my nightmare. Every time a claim of attribution is made—right or wrong—it becomes part of a permanent record; an un-verifiable provenance that is built upon by the next security researcher or startup who wants to grab a headline, and by the one after him, and the one after her. The most sensational of those claims are almost assured of international media attention, and if they align with U.S. policy interests, they rapidly move from unverified theory to fact.

Because each headline is informed by a report, and because indicators of compromise and other technical details are shared between vendors worldwide, any State or non-State actor in the world will soon have the ability to imitate an APT group with State attribution, launch an attack against another State, and generate sufficient harmful effects to trigger an international incident. All because some commercial cybersecurity companies are compelled to chase headlines with sensational claims of attribution that cannot be verified. . . .”

Program Highlights Include: The CIA/State Department background of Kurt Volker (nice Anglo-Saxon name, that), Trump’s envoy to Ukraine and an advocate of selling weaponry to that benighted state; Andrii Artemenko and Felix Sater’s would-be associate in the Ukrainian nuclear power plant scheme, Robert Armao; Armao’s links to Nelson Rockefeller, Marc Rich and Francesco Pazienza (a figure in the investigations into P-2, the shooting of Pope John Paul I and the collapse of the Banco Ambrosiano); Review of James Comey’s role in investigating Bill Clinton’s pardon of Marc Rich; review of the revival of the FBI’s Twitter account and its dissemination of Marc Rich material on the eve of the election; review of Felix Sater’s CIA/FBI background; Auerenheimer’s obsession with Timothy McVeigh; Brandon Russell’s fascination with Timothy McVeigh..

Developing information about the cast of characters in the “Russia-Gate” psy-op, we highlight the political allegiance of “Team Trump”–the operatives involved with Trump’s campaign and business dealings with Russia, as well as Robert Mueller, former FBI chief and a very special prosecutor indeed.

Although Trump certainly had links to Russian mob figures, they are by no means the prime movers in this drama.

Most importantly, we detail the political resumes and deep politics underlying the cast of characters in this drama, tracking the operational links back to Joe McCarthy and the red-baiting specialists from the first Cold War.

Joe McCarthy legal point man Roy Cohn is, to a considerable extent, the spider at the center of this web. Cohn:

1.-Was Trump’s attorney for much of “The Donald’s” professional life.
2.-Introduced Trump campaign manager and dirty tricks specialist Roger Stone to the seated President.
3.-Was instrumental in arranging for a bribe which made “independent” Republican John Anderson the Presidential candidate for the Liberal Party in New York. This gambit gave Reagan a key victory in New York. Cohn and Stone’s associate in this operation was Anthony “Fat Tony” Salerno–one of Cohn’s mob clients and among Donald Trump’s organized crime associates as well.
4.-Was the point man for introducing Rupert Murdoch to Ronald Reagan and forging the right-wing media attack machine that dominates today, the most prominent element of which is Fox News.

Roger Stone is another figure who weaves throughout this concatenation. Stone:

1.-Was Donald Trump’s campaign manager and later dirty tricks operative, who networked with WikiLeaks go-between for the Trump/Alt-right crew.
2.-Was touting Libertarian Party candidate Gary Johnson. Johnson and Jill Stein were advocated for by Stone as participants in the debates between Hillary Clinton and Trump. (Johnson and Stein’s combined vote total helped Trump win in several key states.)
3.-Worked with Roy Cohn to put “independent” Republican John Anderson the Presidential candidate for the Liberal Party in New York. This gambit gave Reagan a key victory in New York, as noted above.

The point man for the Trump business interests in their dealings with Russia is Felix Sater. A Russian-born immigrant, Sater is a professional criminal and a convicted felon with historical links to the Mafia. Beyond that, and more importantly, Sater is an FBI informant and a CIA contract agent. As the media firestorm around “Russia-gate” builds, it is important not to lose sight of Sater. ” . . . . He [Sater] also provided other purported national security services for a reported fee of $300,000. Stories abound as to what else Sater may or may not have done in the arena of national security. . . .” We wonder if helping the “Russia-Gate” op may have been one of those.

Beyond Sater, other key players in this concatenation do not track back to “Kremlin/Putin/FSB/KGB.” Rob Goldstone–the publicist whose overture to Donald Trump, Jr. initiated the latest “Russia-gate journalistic feeding frenzy in the media, began his career a journalistic foot soldier for Rupert Murdoch, the very same Rupert Murdoch whose christening as a GOP/right-wing propagandist was initiated by Roy Cohn.

Goldstone contacted Donald Trump Jr., dangling the bait that there might be dirt on Hillary available if he met with some associates. Foremost among those is a Russian attorney, Natalie Veselnitskaya. Her apparent purpose in this meeting was not to offer up dirt on Hillary Clinton but to work toward easing a media lockdown on a documentary about the Magnitsky affair.

Spun in the West, the U.S. in particular, as a classic example of ham-fisted Russian corruption and violence, the Magnitsky affair was revealed in the film documentary to be an example of U.S. corruption, not Russian.

Crafted by Putin political opponent Andrei Nekrasov, the film revealed an unexpected dynamic: ” . . . . Nekrasov discovered that a woman working in Browder’s company was the actual whistleblower and that Magnitsky – rather than a crusading lawyer – was an accountant who was implicated in the scheme. . . .”

Attempting to lift the media blackout on Nekrasov’s film was Veselnitskaya’s goal, not disseminating dirt on Hillary Clinton.

Program Highlights Include: the financing of Joe McCarthy’s career by Nazi sympathizer Walter Harnischfeger, part of the German-American Fifth Column in this country which was at the forefront of the discussion in FTR #’s 918, 919; McCarthy’s use of a postwar Nazi network headed by General Karl Wolff, SS chief Heinrich Himmler’s personal adjutant; Special Prosecutor Robert Mueller’s role in covering up the BCCI scandal and the overlapping Operation Green Quest investigation pursuant to 9/11.

Recent developments are suggestive of the ominous possibility of an imminent Third World War. We present some new information and recap and further analyze stories covered in previous programs in order to underscore and highlight the potential devastation of these events.

As the furor (“fuehrer”?) surrounding the potentially lethal political hoax known as “Russia-gate” gains momentum, it should be noted that the point man for the Trump business interests in their dealings with Russia is Felix Sater. A Russian-born immigrant, Sater is a professional criminal and a convicted felon with historical links to the Mafia. Beyond that, and more importantly, Sater is an FBI informant and a CIA contract agent: “. . . . There is every indication that the extraordinarily lenient treatment resulted from Sater playing a get-out-of-jail free card. Shortly before his secret guilty plea, Sater became a freelance operative of the Central Intelligence Agency. One of his fellow stock swindlers, Salvatore Lauria, wrote a book about it. The Scorpion and the Frog is described on its cover as ‘the true story of one man’s fraudulent rise and fall in the Wall Street of the nineties.’ According to Lauria–and the court files that have been unsealed–Sater helped the CIA buy small missiles before they got to terrorists. He also provided other purported national security services for a reported fee of $300,000. Stories abound as to what else Sater may or may not have done in the arena of national security. . . .”

Sater was active on behalf of the Trumps in the fall of 2015: “. . . . Sater worked on a plan for a Trump Tower in Moscow as recently as the fall of 2015, but he said that had come to a halt because of Trump’s presidential campaign. . . .”

Sater was initiating contact between the Russians and “Team Trump” in January of this year: “ . . . . Nevertheless, in late January, Sater and a Ukrainian lawmaker reportedly met with Trump’s personal lawyer, Michael Cohen, at a New York hotel. According to the [New York] Times, they discussed a plan that involved the U.S. lifting sanctions against Russia, and Cohen said he hand-delivered the plan in a sealed envelope to then-national security advisor Michael Flynn. Cohen later denied delivering the envelope to anyone in the White House, according to the Washington Post. . . .”

A stunning development concerns extreme reticence on the part of the U.S. intelligence community:

The Office of the Director of National Intelligence had an “interesting” response to a Freedom of Information Act lawsuit demanding the release of the classified report given to President Obama back in January purporting to show the Russian government was behind the hacks. According to the ODNI, the requested document would present a risk to human intelligence sources by revealing the comparative weight given to human vs technical evidence, risking US sources and methods. But the ODNI went further, suggesting that even releasing a fully redacted document would present similar risks!

It is NOT easy to see the ODNI’s reluctance to release even a fully-redacted copy of the report as anything but disingenuous. In the context of potentially devastating deterioration of Russian/U.S. relations over Syria, Ukraine, and the Russian “election-hacking” uproar, the ODNI’s behavior cannot be anything but disquieting:

” . . . . The intelligence official argued that a redacted version of the original report would allow a trained eye to assess ‘comparative weight’ of human intelligence and signals intelligence reporting included in the compendium. Release of some of the information the privacy-focused organization wants made public ‘could prove fatal to U.S. human intelligence sources,’ [Deputy Director of National Intelligence for Intelligence Integration Edward] Gistaro warned.

Gistaro also appears to argue that even if officials blacked out the whole report, highly classified information would be at risk.

‘I agree with the [National Intelligence Council] that a heavily or even fully redacted version of the classified report can not be publicly released without jeopardizing national security information properly classified as SECRET or TOP SECRET,’ he wrote. . . . ‘The ODNI should release the complete report to EPIC so that the public and the Congress can understand the full extent of the Russian interference with the 2016 Presidential election,’ EPIC’s Marc Rotenberg told POLITICO Tuesday. ‘It is already clear that government secrecy is frustrating meaningful oversight. The FBI, for example, will not even identify the states that were targeted by Russia.’ . . . ”

With the high-profile hacks being attributed–almost certainly falsely–to Russia, there are ominous developments taking place that may well lead to a Third World War. During the closing days of his Presidency, Obama authorized the planting of cyber weapons on Russian computer networks. Obama did this after talking with Putin on the Hot Line, established to prevent a Third World War. Putin denied interfering in the U.S. election.

The conclusion that Russia hacked the U.S. election on Putin’s orders appears to have been based on a CIA source in the Kremlin. Even when that intelligence was delivered, other agencies weren’t ready to accept the CIA’s conclusion and it took intelligence from another nation (not named) to provide the final intelligence tipping point that led to a broad-based conclusion the not only was the Russian government behind the cyberattacks but that Vladimir Putin himself ordered it.

That ally’s intelligence is described as “the most critical technical intelligence on Russia,” however the NSA still wasn’t convinced based on what sounds like a lack of confidence in that source. Thus, it looks like a CIA Kremlin source and an unnamed foreign intelligence agency with questionable credentials are the basis of what appears to be a likely future full-scale US/Russian cyberwar.

Of paramount significance is the fact that IF, on Putin’s orders (and we are to believe such) Russia continued to hack U.S. computer systems to influence the election, Putin would have to have gone utterly mad. Those hacks would have precluded any rapprochement between Russia and the United States under a President Trump. There is no indication that Putin went off the deep end.

Also auguring a possible Third World War are two developments in Syria. Seymour Hersh published an article in “Die Welt” revealing that, not only was the April 4 alleged Sarin attack NOT a chemical weapons attack but there was widespread knowledge of this in American military and intelligence circles.

What did the intelligence community know about the attack? The Russian and Syrian air force had informed the US in advance of that airstrike that they had intelligence that top level leaders of Ahrar al-Sham and Jabhat al-Nusra were meeting in that building and they informed of the US of the attack plan in advance of the attack and that it was on a “high-value” target. And the attack involved the unusual use of a guided bomb and Syria’s top pilots. ” . . . . Russian and Syrian intelligence officials, who coordinate operations closely with the American command posts, made it clear that the planned strike on Khan Sheikhoun was special because of the high-value target. ‘It was a red-hot change. The mission was out of the ordinary – scrub the sked,’ the senior adviser told me. ‘Every operations officer in the region’ – in the Army, Marine Corps, Air Force, CIA and NSA – ‘had to know there was something going on. The Russians gave the Syrian Air Force a guided bomb and that was a rarity. They’re skimpy with their guided bombs and rarely share them with the Syrian Air Force. And the Syrians assigned their best pilot to the mission, with the best wingman.’ The advance intelligence on the target, as supplied by the Russians, was given the highest possible score inside the American community. . . .”

Following the attack, US intelligence concluded that there was no sarin gas attack, Assad wouldn’t have been that politically suicidal. The symptoms of chemical poisoning following the bombing was likely due to a mixture of chlorine, fertilizers, and other chemicals stored in the building that was targeted by the Syrian airforce created by secondary explosions from the initial bombing. ” . . . ‘This was not a chemical weapons strike,’ the adviser said. ‘That’s a fairy tale. . . .”

The symptoms of chemical poisoning following the bombing was likely due to a mixture of chlorine, fertilizers, and other chemicals stored in the building that was targeted by the Syrian airforce created by secondary explosions from the initial bombing. ” . . . . A Bomb Damage Assessment (BDA) by the U.S. military later determined that the heat and force of the 500-pound Syrian bomb triggered a series of secondary explosions that could have generated a huge toxic cloud that began to spread over the town, formed by the release of the fertilizers, disinfectants and other goods stored in the basement, its effect magnified by the dense morning air, which trapped the fumes close to the ground. . . .”

The behavior of the Trump administration was not only in direct conflict with intelligence on the attack, but reinforced propaganda by some of the Al-Qaeda-linked jihadists the West has been using as proxy warriors in Syria and elsewhere: ” . . . . ‘The Salafists and jihadists got everything they wanted out of their hyped-up Syrian nerve gas ploy,’ the senior adviser to the U.S. intelligence community told me, referring to the flare up of tensions between Syria, Russia and America. ‘The issue is, what if there’s another false flag sarin attack credited to hated Syria? Trump has upped the ante and painted himself into a corner with his decision to bomb. And do not think these guys are not planning the next faked attack. Trump will have no choice but to bomb again, and harder. He’s incapable of saying he made a mistake.’ . . .”

Program Highlights Include: Review of a Trump administration warning of another supposed, impending “Syrian chemical weapons strike”–a warning that has since been retracted; discussion of brilliant Nazi hacker Andrew Auerenheimer’s orchestration of an “Alt-right” online intimidation campaign against CNN employees; Auerenheimer’s current residence in Ukraine; the ominous possibility of the activation/manipulation of the NSA cyber-weapons installed on Russian computer networks by a third party (perhaps someone with the capabilities of the brilliant Auerenheimer); review of the observations by a German professor–opposed to Nazism/Hitler–who described the essence of what it was like, subjectively, to live through the rise of Hitler–his observation presented in the context of the ODNI’s decision not to release even a fully-redacted version of the intelligence report on “Russian meddling” in the U.S. election: ” . . . . . . . . What happened here was the gradual habituation of the people, little by little, to being governed by surprise, to receiving decisions deliberated in secret, to believing that the situation was so complicated that the government had to act on information which the people could not understand because of nationality security, so dangerous that even if the people the people could understand it, it could not be released because of national security. . . .”

As we have noted in many previous broadcasts and posts, cyber attacks are easily disguised. Perpetrating a “cyber false flag” operation is disturbingly easy to do.

This is of paramount significance in evaluating the increasingly neo-McCarthyite New Cold War propaganda about “Russian interference” in the U.S. election.

Compounding the situation are some recent disclosures and developments:

1.–We learn that the CIA’s hacking tools are specifically crafted to mask CIA authorship of the attacks. Most significantly, for our purposes, is the fact that the Agency’s hacking tools are engineered in such a way as to permit the authors of the event to represent themselves as Russian.

2.–The NSA’s elite hacking technology has been made widely available to the hacking community, courtesy of “The Shadow Brokers.”

3.–During the 2016 Presidential campaign, Michael Flynn was professionally involved with numerous cyber-security and cyber arms manufacturing firms: “ . . . . The month before Flynn joined the advisory board of OSY Technologies, NSO Group opened up a new arm called WestBridge Technologies, Inc., in the D.C. region. (The company was originally registered in Delaware in 2014, but formed in Maryland in April 2016.) Led by NSO Group co-founder Lavie, WestBridge is vying for federal government contracts for NSO Group’s products. Hiring Flynn would provide NSO Group with a well-connected figure in Washington, to help get its foot in the door of the notoriously insular world of secret intelligence budgeting. . . .When you’re trying to build up your business, you need someone who has connections, someone who is seen as an authority and a legitimate presence,” Johnson said. Hiring someone with Flynn’s background in intelligence would ‘open up doors that they wouldn’t have had access to,’ Johnson said.Throughout 2016, Flynn worked for a number of cybersecurity firms personally and through his consulting firm, Flynn Intel Group. In addition to his advisory board seat at OSY Technologies, he sat on the board of Adobe Systems, a large software company with Pentagon contracts, and the boards of the cybersecurity companies GreenZone Systems and HALO Privacy. (Though Flynn described himself as an Adobe advisory board member in his financial disclosure paperwork, the group said in a statement that he provided only “periodic counsel to Adobe’s public sector team.”) . . .”

4.–NSO Group and OSY Technologies specialize in spear-fishing attacks, one of the methodologies used in the hacks of U.S. election computers. Is there any link between Flynn’s cyber-security/cyber arms links and the high-profile hacks during the campaign?

5.–A GOP tech database–Deep Root–Exposed the data of almost two hundred million American voters to widespread scrutiny. Is there any connection between Deep Root, the GOP and the alleged Russian hacking of U.S. voting computers?

Following a Bloomberg report about widespread Russian hacking of American elections systems: “ . . . . Kay Stimson, spokeswoman for the National Association of Secretaries of State, said the members of her group — which represents the chief election officials in 40 states — were taken aback by the allegation that 39 states were hacked. ‘We cannot verify any information in that report,’ Stimson told Benzinga. “It has some claims that have raised some red flags. I don’t know where they’re getting it. We’re not able to assess to the credibility.’ She said that some cybersecurity firms were engaging in scare tactics at the state and local levels. ‘There are cybersecurity firms making some wild claims,’ she said. ‘It is a very aggressive industry.’ . . .”

With the high-profile hacks being attributed–almost certainly falsely–to Russia, there are ominous developments taking place that may well lead to a Third World War. During the closing days of his Presidency, Obama authorized the planting of cyber weapons on Russian computer networks. Obama did this after talking with Putin on the Hot Line, established to prevent a Third World War. Putin denied interfering in the U.S. election.

The conclusion that Russia hacked the U.S. election on Putin’s orders appears to have been based on a CIA source in the Kremlin. Even when that intelligence was delivered, other agencies weren’t ready to accept the CIA’s conclusion and it took intelligence from another nation (not named) to provide the final intelligence tipping point that led to a broad-based conclusion the not only was the Russian government behind the cyberattacks but that Vladimir Putin himself ordered it.

That ally’s intelligence is described as “the most critical technical intelligence on Russia,” however the NSA still wasn’t convinced based on what sounds like a lack of confidence in that source. Thus, it looks like a CIA Kremlin source and an unnamed foreign intelligence agency with questionable credentials are the basis of what appears to be a likely future full-scale US/Russian cyberwar.

Of paramount significance is the fact that IF, on Putin’s orders (and we are to believe such) Russia continued to hack U.S. computer systems to influence the election, Putin would have to have gone utterly mad. Those hacks would have precluded any rapprochement between Russia and the United States under a President Trump. There is not indication that Putin went off the deep end.

Also auguring a Third World War are two developments in Syria. Seymour Hersh published an article in Die Welt revealing that, not only was the April 4 alleged Sarin attack NOT a chemical weapons attack but there was widespread knowledge of this in American military and intelligence circles.

Ominously, the Trump White House is claiming they have advance knowledge of an impending Syrian chemical weapons strike and will punish Syria heavily, and hold Russia accountable.

Program Highlights Include: The fact that the bulk of activity detected by the DHS on U.S. election systems was “scanning”–standard operating procedure for hacking; a former NSA hacking specialist–Jake Williams–said that spear-phishing operation was of “medium sophistication” that “practically any hacker can pull off”; the question of whether or not GOP Secretaries of State might have deliberately responded to the spear-phishing e-mails that permitted the “hit” on U.S. election systems; the Russian authorization of the use by the Syrian air force of a smart bomb to eliminate Al-Qaeda-linked jihadists; the release of a chemical cloud as a result of that strike that was caused by secondary explosions; Cambridge Analytica’s hiring of GOP online data-basing kingpin Darren Bolding.

Updating various paths of inquiry and opening new ones, this program highlights some terrifying possibilities, present and future.

After setting forth Yale historian Timothy Snyder’s opinion that Trump would try to stage a Reichstag Fire type event, we chronicle Trump’s desire to amend or eliminate the First Amendment of the Constitution and “loosen” the libel laws.

Much of the program updates terrifying developments in the area of what we have called “technocratic fascism,” including Facebook’s plans to implement brain-to-computer interface that would permit Facebook (and others) to tap into the network’s users thoughts. This technology is being overseen and developed by Facebook’s head of R & D–Regina Dugan–the former head of DARPA. Facebook’s Building 8 R & D program is patterned after DARPA.

Amazon is introducing the new Echo Look, which will put a camera, connected to an artificial intelligence, in people’s bedrooms, ostensibly to provide them with real-time fashion critique.

The broadcast concludes with a look at the latest alleged “Russian” hack–that of French president Emanuel Macron. The hacked documents contained Cyrillic metadata, something Russian intelligence would NOT have done.

Program Highlights Include: Facebook’s communication of intimate data on stressed and troubled teenagers to advertisers and other third parties; the complete lack of civil liberties and privacy oversight of the impending Facebook and Amazon technologies; review of the analysis of the alleged “Russian” hacks, documenting the ludicrous nature of the assertions; the latest alleged hack by the Shadow Brokers, involving the communication of white supremacist ideology and an assertion that the culprits are pro-Trump U.S. Deep State insiders.

The entry point to our exploration of Julius Evola is top Trump adviser and first tier NSC member Steve Bannon. Evola is a key influence on Bannon. Evola was an early occult fascist, with strong connections with Mussolini’s Italy. Eventually Evola established strong, lasting connections with the Nazi SS, both operationally and ideologically.

Evola has also influenced Alexander Dugin, a prominent Russian ideologue and politician.

The broadcast recaps FTR #233, which details Evola’s work for the SS and Kevin Coogan’s theory that Evola was involved with an SS occult network incorporating important people and institutions in both the West and behind the so-called “Iron Curtain.” Later in the program, we further develop the story of Alexander Dugin, a Russian “Alt-right” thinker and politician prominent in the Russian government. As mentioned above, Dugin, like Bannon, has been influenced by Evola.

We wonder if, in the persons of Bannon and Dugin, we are seeing “Western” and “Eastern” manifestations of what Kevin conceptualizes as “The Order.”

Drawing on material from Kevin’s seminal work Dreamer of the Day: Francis Parker Yockey and The Postwar Fascist International (soft cover, Autonomedia, copyright 1999, ISBN I-57027-039-2), the program sets forth a hypothetical construct advanced in the book. Hypothesizing an international fascist milieu originating from (though not coterminous with) the ideological orientation of the Waffen SS, Kevin terms this milieu “The Order.” (This entity is not to be confused with the 1980’s American Nazi organization of the same name.)

Beginning with analysis of Kevin’s discussion of the work of fascist occultist Julius Evola in Vienna during the conclusion of World War II, the program documents Evola’s operations on behalf of the SD (the SS intelligence service.)

Like SS chief Himmler, Evola saw the SS as the successors to the Kshatriya class (the Hindu warrior caste.) Seeing Germany and Europe as succumbing to “barbarian invasion,” Evola saw a pagan, anti-Christian mysticism as necessarily antithetical to the Judeo-Christian culture which, he felt, had led the West to decline before the “Bolshevik hordes” of the Soviet Union and the “chewing gum imperialism” of the United States.

Kevin felt that this organization (reflecting the ideological stance of an element of the Waffen SS) would be pan-European in scope and orientation, and not necessarily entirely chauvinistic from a Nordic or Germanic racial and national standpoint. Nourished by bank accounts secreted abroad, this hypothetical organization functions in an underground fashion. (The funds that nourished this institution would necessarily have derived from the Bormann Organization.) The Order appears to have established ostensibly friendly relations with the West.

This organization may very well have begun working with the U.S. intelligence apparat after the war, as evidenced by, among other things, the collaboration between post-war SS elements and the CIA. Coogan hypothesizes that CIA director Allen Dulles may have played a primary role in such an accord.

Another influence on a Dulles/Order collaborative relationship may have been psychologist Carl Jung, who was connected to Dulles and to the Third Reich.

Significantly, the Order appears to have overlapped, and also worked with, elements of the East Bloc, including former Soviet and East German national security officials. The organization also maintained contacts with “anti-imperialist,” Third World liberation movements.

The Order appears to have exploited its contacts within both East and West blocs to further its own fascistic and elitist agenda, playing both sides against the middle during the Cold War.

The Dugin/Evola affiliation and the Bannon/Evola affiliation may be significant in that context.

Program Highlights Include: Sebastian Gorka’s manifestation of the heraldry of the order of Vitezi Rend, closely associated with Nazi Germany’s Hungarian allies;
Adbusters magazine’s publicizing of Alexander Dugin–we review the fact that Adbusters appears to have played a key role in jumpstarting the “Occupy” movement.

With a new Cold War gaining momentum and charges of Russian interference in the U.S. election, this program takes stock of information pointing in the other direction. After reviewing previous discussion of why the DNC, John Podesta and NSA “hacks” do not withstand scrutiny, the broadcast sets forth information indicating that Ukrainian fascists and related elements may well be the authors of a “cyber false-flag” operation.

Not only is the so-called “evidence” characteristic of a relatively clumsy false-flag operation–albeit one conducted on the internet–but the so-called “experts,” link to the milieu of the Reinhard Gehlen “Org.”

The joint CIA/FBI/NSA declassified version of the Intelligence Report on Russian hacking came out. There is no substantive detail in the report:“ . . . . To summarize, the report says that the CIA, FBI, and National Security Agency believe that Russian hackers—directed ultimately by Vladimir Putin—hacked email accounts belonging to the Democratic National Committee and to Clinton campaign chairman John Podesta and then passed the material they obtained on to WikiLeaks through a third party. This was done, the report asserts, because the Russians believed that Donald Trump would be friendlier to their country’s interests, as president, than Hillary Clinton. And … that’s about it. Not counting intro pages or appendices, the report is five pages long and does not include any description of the actual evidence that Russian actors were responsible for the DNC/Podesta hacks (an assertion that’s supported by publicly available evidence analyzed by third parties) or the assertion that Putin ultimately directed the release of hacked material in order to help elect Donald Trump (an assertion that’s harder to verify independently). . . . .”

The Bitly technology used in the hacks enabled the entire world to see what was going on! This strongly indicates a cyber-false flag operation: ” . . . . Using Bitly allowed ‘third parties to see their entire campaign including all their targets— something you’d want to keep secret,’ Tom Finney, a researcher at SecureWorks, told Motherboard. It was one of Fancy Bear’s ‘gravest mistakes,’ as Thomas Rid, a professor at King’s College who has closely studied the case, put it in a new piece published on Thursday in Esquire, as it gave researchers unprecedented visibility into the activities of Fancy Bear, linking different parts of its larger campaign together. . . .”

It should be noted that while this report is signed off on by the CIA, NSA, and FBI, the FBI never examined the DNC’s hacked server. Instead, according to the DNC, the job was outsourced to CrowdStrike! Neither the FBI, nor any other U.S. government entity has run an independent forensic analysis on the system! ” . . . Six months after the FBI first said it was investigating the hack of the Democratic National Committee’s computer network, the bureau has still not requested access to the hacked servers, a DNC spokesman said. No US government entity has run an independent forensic analysis on the system, one US intelligence official told BuzzFeed News. . . .The FBI has instead relied on computer forensics from a third-party tech security company, CrowdStrike, which first determined in May of last year that the DNC’s servers had been infiltrated by Russia-linked hackers, the U.S. intelligence official told BuzzFeed News. . .’CrowdStrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate,’ the intelligence official said, adding they were confident Russia was behind the widespread hacks. . . It’s unclear why the FBI didn’t request access to the DNC servers, and whether it’s common practice when the bureau investigates the cyberattacks against private entities by state actors, like when the Sony Corporation was hacked by North Korea in 2014. BuzzFeed News spoke to three cybersecurity companies who have worked on major breaches in the last 15 months, who said that it was “par for the course” for the FBI to do their own forensic research into the hacks. None wanted to comment on the record on another cybersecurity company’s work, or the work being done by a national security agency. . . .”

The FBI claims that the DNC denied them access to the servers! Right! Note the prominence of CrowdStrike in this imbroglio. More about them below. ” . . . . The FBI struck back at the Democratic National Committee on Thursday, accusing it of denying federal investigators access to its computer systems and hamstringing its investigation into the infiltration of DNC servers by Russia-backed hackers. ‘The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated. This left the FBI no choice but to rely upon a third party for information,’ a senior law enforcement official told BuzzFeed News in a statement. ‘These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.’ . . . The warring statements are the latest twists in an extraordinary standoff between the Democrats and federal investigators that reached a fever pitch over the bureau’s probe into Democratic nominee Hillary Clinton’s private email server. . . . The FBI announced it was investigating the hack of the DNC’s servers in July, after a third-party computer security firm, Crowdstrike, said it had evidence of Kremlin-backed hackers infiltrating its system. . . .”

The DNC responded to the FBI’s counter-assertion by reasserting that it’s giving the FBI full access to whatever it requested. If there’s a problem with the FBI getting access to that server, it’s a problem between the FBI and Crowdstrike: ” . . . The FBI had previously told lawmakers on the Hill that the DNC had not allowed federal investigators to access their servers. After BuzzFeed News reported on Wednesday that the DNC claimed FBI agents had never asked for the servers, congressional officials pressured the FBI for answers. A senior law enforcement official issued a public statement on the matter Thursday night. ‘Someone is lying their ass off,’ a US intelligence official said of the warring statements. But officials with the DNC still assert they’ve ‘cooperated with the FBI 150%.They’ve had access to anything they want. Anything that they desire. Anything they’ve asked, we’ve cooperated,’ the DNC official said. ‘If anybody contradicts that it’s between Crowdstrike and the FBI.’ . . .Without direct access to the computer network, another US intelligence official told BuzzFeed, federal investigators had been forced to rely on the findings of the private cybersecurity firm Crowdstrike for computer forensics. From May through August of 2016, the Democratic National Committee paid Crowdstrike $267,807 dollars for maintenance, data services and consulting, among other things, according to federal records. . . .”

An important article underscores that many tech experts disagree with the government’s so-called analysis: ” . . . . Yet despite the scores of breathless media pieces that assert that Russia’s interference in the election is ‘case closed,’might some skepticism be in order? Some cyber experts say ‘yes.’ . . . Cyber-security experts have also weighed in. The security editor at Ars Technica observed that ‘Instead of providing smoking guns that the Russian government was behind specific hacks,’ the government report ‘largely restates previous private sector claims without providing any support for their validity.’ Robert M. Lee of the cyber-security company Dragos noted that the report ‘reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence.’ Cybersecurity consultant Jeffrey Carr noted that the report ‘merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.’ . . .”

CrowdStrike–at the epicenter of the supposed Russian hacking controversy is noteworthy. Its co-founder and chief technology officer, Dmitry Alperovitch is a senior fellow at the Atlantic Council, financed by elements that are at the foundation of fanning the flames of the New Cold War: “In this respect, it is worth noting that one of the commercial cybersecurity companies the government has relied on is Crowdstrike, which was one of the companies initially brought in by the DNC to investigate the alleged hacks. . . . Dmitri Alperovitch is also a senior fellow at the Atlantic Council. . . . The connection between [Crowdstrike co-founder and chief technology officer Dmitri] Alperovitch and the Atlantic Council has gone largely unremarked upon, but it is relevant given that the Atlantic Council—which is is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk—has been among the loudest voices calling for a new Cold War with Russia. As I pointed out in the pages of The Nation in November, the Atlantic Council has spent the past several years producing some of the most virulent specimens of the new Cold War propaganda. . . . ”

There was an update back in December from the German government regarding its assessment of the 2015 Bundgestag hacks (attributed to “Fancy Bear” and “Cozy Bear,” as mentioned in the Sandro Gaycken post above) that it attributed to APT28 and Russia: while it asserts the hacks did indeed take place, the leaked documents were later determined to be an insider leak (via Google translate). “ . . . . According to the report, federal security authorities are convinced that not hackers had stolen the 2420 documents published by the Internet platform Wikileaks in early December. There was certainly no evidence that the material had been stolen in the cyber attack on the Bundestag in 2015, it was called into security crises. . . . ”

Another article details at length the skepticism and outright scorn many cybersecurity experts feel concerning the report. ” . . . . Did the Russian government hack the DNC and feed documents to WikiLeaks? There are really two questions here: who hacked the DNC, and who released the DNC documents? These are not necessarily the same. An earlier intrusion into German parliament servers was blamed on the Russians, yet the release of documents to WikiLeaks is thought to have originated from an insider. [35] Had the Russians hacked into the DNC, it may have been to gather intelligence, while another actor released the documents. But it is far from certain that Russian intelligence services had anything to do with the intrusions. Julian Assange says that he did not receive the DNC documents from a nation-state. It has been pointed out that Russia could have used a third party to pass along the material. Fair enough, but former UK diplomat Craig Murray asserts: ‘I know who the source is… It’s from a Washington insider. It’s not from Russia.’ [We wonder if it might have been Tulsi Gabbard–D.E.] [36] . . . .”

Exemplifying some of the points of dissension in the above-linked story: ” . . . . Cybersecurity analyst Robert Graham was particularly blistering in his assessment of the government’s report, characterizing it as “full of garbage.” The report fails to tie the indicators of compromise to the Russian government. ‘It contains signatures of viruses that are publicly available, used by hackers around the world, not just Russia. It contains a long list of IP addresses from perfectly normal services, like Tor, Google, Dropbox, Yahoo, and so forth. Yes, hackers use Yahoo for phishing and maladvertising. It doesn’t mean every access of Yahoo is an ‘indicator of compromise’.’ Graham compared the list of IP addresses against those accessed by his web browser, and found two matches. ‘No,’ he continues. ‘This doesn’t mean I’ve been hacked. It means I just had a normal interaction with Yahoo. It means the Grizzly Steppe IoCs are garbage. . . .”

The source code used in the attacks traces back to Ukraine! ” . . . . In conjunction with the report, the FBI and Department of Homeland Security provided a list of IP addresses it identified with Russian intelligence services. [22] Wordfence analyzed the IP addresses as well as a PHP malware script provided by the Department of Homeland Security. In analyzing the source code, Wordfence discovered that the software used was P.A.S., version 3.1.0. It then found that the website that manufactures the malware had a site country code indicating that it is Ukrainian. [Note this!–D.E.] The current version of the P.A.S. software is 4.1.1, which is much newer than that used in the DNC hack, and the latest version has changed ‘quite substantially.’ Wordfence notes that not only is the software ‘commonly available,’ but also that it would be reasonable to expect ‘Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.’ To put it plainly, Wordfence concludes that the malware sample ‘has no apparent relationship with Russian intelligence.’ . . .”

The program concludes with a frightening piece of legislation signed into law by Barack Obama in December. It is an ominous portent of the use of government and military power to suppress dissenting views as being “Russian” propaganda tools! “. . . . The new law is remarkable for a number of reasons, not the least because it merges a new McCarthyism about purported dissemination of Russian ‘propaganda’ on the Internet with a new Orwellianism by creating a kind of Ministry of Truth – or Global Engagement Center – to protect the American people from ‘foreign propaganda and disinformation.’ . . . As part of the effort to detect and defeat these unwanted narratives, the law authorizes the Center to: ‘Facilitate the use of a wide range of technologies and techniques by sharing expertise among Federal departments and agencies, seeking expertise from external sources, and implementing best practices.’ (This section is an apparent reference to proposals that Google, Facebook and other technology companies find ways to block or brand certain Internet sites as purveyors of ‘Russian propaganda’ or ‘fake news.’) . . .”

Program Highlights Include: review of information from previous programs linking the disinformation about the high-profile hacks to the milieu of Ukrainian fascism; review of Alexandra Chalupa’s role in disseminating the “Russia did it” meme; review of “Eddie the Friendly Spook” Snowden’s role in the disinformation about the high-profile hacks; the implementation of a frightening new law authorizing the Pentagon and other government agencies to act to counter any information seen as “Russian propaganda.”

This program continues our analysis of the Trump administration as the transformation of what Mr. Emory has called “The Underground Reich” into a mass political movement. At a policy level, the “Trumpenkampfverbande” is a vehicle for the implementation of German Ostpolitik, as set forth in FTR #’s 918 and 919.

Heavily overlapped with information discussed fleetingly in FTR #939, the program begins with analysis of a possible Ukrainian/OUN/B connection to the “high-profile hacks” allegedly perpetrated by Russia.
The hack of Clinton campaign manager John Podesta’s e-mail account (blamed on Russia) originated with a phishing e-mail from Ukraine. “. . . . The email, with the subject line “*Someone has your password,*” greeted Podesta, “Hi John” and then said, “Someone just used your password to try to sign into your Google Account john.podesta@gmail.com.” Then it offered a time stamp and an IP address in “Location: Ukraine.” . . . ”

Analysis of cyber-warfare is daunting–a skilled hacker or hackers can mask their identity effectively, with the result that “cyber-false flag” operations are difficult to discern. It is in this context that we revisit the subject of a Ukrainian fascist link to the “Russia did it” meme.

The OUN/B milieu in the U.S. has apparently been instrumental in generating the “Russia did it” disinformation about the high-profile hacks. In the Alternet.org article, Mark Ames highlights several points:

The “PropOrNot” group quoted in a Washington Post story tagging media outlets, websites and blogs as “Russian/Kremlin stooges/propaganda tools/agents” is linked to the OUN/B heirs now in power in Ukraine. ” . . . One PropOrNot tweet, dated November 17, invokes a 1940s Ukrainian fascist salute “Heroiam Slava!!” [17] to cheer a news item on Ukrainian hackers fighting Russians. The phrase means “Glory to the heroes” and it was formally introduced by the fascist Organization of Ukrainian Nationalists (OUN) at their March-April 1941 congress in Nazi occupied Cracow, as they prepared to serve as Nazi auxiliaries in Operation Barbarossa. . . . ‘the OUN-B introduced another Ukrainian fascist salute at the Second Great Congress of the Ukrainian Nationalists in Cracow in March and April 1941. This was the most popular Ukrainian fascist salute and had to be performed according to the instructions of the OUN-B leadership by raising the right arm ‘slightly to the right, slightly above the peak of the head’ while calling ‘Glory to Ukraine!’ (Slava Ukraїni!) and responding ‘Glory to the Heroes!’ (Heroiam Slava!). . . .”

The OUN/B heirs ruling Ukraine compiled a list of journalists who were “Russian/Kremlin stooges/propaganda tools/agents,” including personal data and contact information (like that made public in the WikiLeaks data dump of DNC e-mails). This list was compiled by the Ukrainian intelligence service, interior ministry and–ahem–hackers: “. . . . One of the more frightening policies enacted by the current oligarch-nationalist regime in Kiev is an online blacklist [42] of journalists accused of collaborating with pro-Russian ‘terrorists.’ [43] The website, ‘Myrotvorets’ [43] or ‘Peacemaker’—was set up by Ukrainian hackers working with state intelligence and police, all of which tend to share the same ultranationalist ideologies as Parubiy and the newly-appointed neo-Nazi chief of the National Police. . . . Ukraine’s journalist blacklist website—operated by Ukrainian hackers working with state intelligence—led to a rash of death threats against the doxxed journalists, whose email addresses, phone numbers and other private information was posted anonymously to the website. Many of these threats came with the wartime Ukrainian fascist salute: “Slava Ukraini!” [Glory to Ukraine!] So when PropOrNot’s anonymous “researchers” reveal only their Ukrainian(s) identity, it’s hard not to think about the spy-linked hackers who posted the deadly ‘Myrotvorets’ blacklist of “treasonous” journalists. . . .”

A Ukrainian activist named Alexandra Chalupa has been instrumental in distributing the “Russia did it” disinformation to Hillary Clinton and influencing the progress of the disinformation in the media. ” . . . . One of the key media sources [46] who blamed the DNC hacks on Russia, ramping up fears of crypto-Putinist infiltration, is a Ukrainian-American lobbyist working for the DNC. She is Alexandra Chalupa—described as the head of the Democratic National Committee’s opposition research on Russia and on Trump, and founder and president of the Ukrainian lobby group ‘US United With Ukraine Coalition’ [47], which lobbied hard to pass a 2014 bill increasing loans and military aid to Ukraine, imposing sanctions on Russians, and tightly aligning US and Ukraine geostrategic interests. . . . In one leaked DNC email [50] earlier this year, Chalupa boasts to DNC Communications Director Luis Miranda that she brought Isikoff to a US-government sponsored Washington event featuring 68 Ukrainian journalists, where Chalupa was invited ‘to speak specifically about Paul Manafort.’ In turn, Isikoff named her as the key inside source [46] ‘proving’ that the Russians were behind the hacks, and that Trump’s campaign was under the spell of Kremlin spies and sorcerers. . . .”

With traditional, “Atlanticist” conservative GOP figures aligning with elements of the CIA to finger Trump as a Putin tool, etc. an epochal event is unfolding, in our opinion. What the brilliant Berkeley professor Peter Dale Scott has termed “The Deep State” is squaring off with the Trumpenkampfverbande, with the latter networking with European fascist and center-left parties to improve relations with Russia. NATO and the Atlanticist dynamic that has dominated post World War II politics are receding, and a German-led EU military is gaining momentum.

Again, we forecast this in FTR #’s 918 and 919.

Next, we note the selection of Stephen Miller, another “alt-right” figure, as an adviser to Trump. “. . . . Miller is a former staffer for the nativist Sen. Jeff Sessions (R-Ala.), now Trump’s nominee for attorney general. The announcement of Miller’s new role drew praise from white nationalist leader Richard Spencer. ‘Stephen is a highly competent and tough individual,’ Spencer, who famously coined the term ‘alt-right’ to describe the insurgent right-wing movement that has attracted white nationalists and supremacists, told Mother Jones on Wednesday. ‘So I have no doubt that he will do a great job.’ . . . .”

In past programs, we have noted the Third Reich origins of the Freedom Party in Austria. That party is now networking both with Putin and Trump’s “alt-right” leaning National Security Adviser Michael Flynn. One of the shared goals of both the Freedom Party, corporate Germany and–through the latter–the Underground Reich is the lifting of economic sanctions on Russia.

The broadcast underscores the continuity between the “new” Freedom Party and the old, Nazi-generated Freedom Party. The issue of the South Tyrol region is exemplary in this regard:

” . . . . A TV talk show host, Corinna Milborn, grilled [Freedopm Party presidential candidate Norbert] . . . Hofer last week for an hour over his alleged nationalist views and his calls for undoing the “unjust border” that keeps South Tyrol, a region of northern Italy, apart from Austria’s Tyrol. Mr. Hofer’s grin evaporated and he almost blew his cool. . . .”

Austrian Freedom Party founder Herbert Schweiger is no stranger to the issue of the South Tyrol: “. . . . Herbert Schweiger makes no attempt to hide his Nazi views. At his home in the Austrian mountains, the former SS officer gazes out of a window to a view of a misty alpine valley. Described to me as the ‘Puppet Master’ of the far right, Schweiger, 85, is a legendary figure for neo-Nazis across the world. Our time is coming again and soon we will have another leader like Hitler,’ he says. Still remarkably sharp-minded, Schweiger was a lieutenant in the infamous Waffen SS Panzer Division Leibstandarte Adolf Hitler, an elite unit originally formed before WWII to act as the Führer’s personal bodyguards. . . .He was a founding member of three political parties in Austria – the VDU, the banned NDP and the FPO. He has given his support to the current leader of the FPO. ‘Strache is doing the right thing by fighting the foreigner,’ says Schweiger. He is now in close contact with the Kameradschaften, underground cells of hardcore neo-Nazis across Austria and Germany who, over the past three years, have started to infiltrate political parties such as the FPO. His belief that the bullet and the ballot box go hand in hand goes back to 1961, when he helped to train a terrorist movement fighting for the reunification of Austria and South Tyrol. ‘I was an explosives expert in the SS so I trained Burschenschaften how to make bombs. We used the hotel my wife and I owned as a training camp,’ he says. The hotel he refers to is 50 yards from his home. Thirty people in Italy were murdered during the campaign. One of the men convicted for the atrocities, Norbert Burger, later formed the now-banned neo-Nazi NDP party with Schweiger. . . .”

In France, the center-left candidate for president–Francois Fillon–is pushing both for an increase in French defense spending and a German-led drive for an all EU army. Both are goals of the Underground Reich and the Trumpenkampfverbande, as set forth in FTR #’s 918 and 919. His views on rapprochement with Russia are typical of a significant portion of a relatively broad spectrum of European political parties. This resonates well with the Trumpenkampfverbande, again, as discussed in FTR #’s 918 and 919:

” . . . . similar trends are playing out in several European countries, along their own particular national lines. In Germany, for instance, center-left leaders are pushing to abandon their country’s role in leading European efforts to counter Russia. Instead, they advocate reverting to the Cold War-era policy of Ostpolitik, in which West Germany sought a neutral balancing role between East and West.

“Often, West European politicians do not see themselves as explicitly calling for aligning with Moscow, but rather for abandoning the costly mission to counter Russia’s aggression against faraway eastern states at a moment when they have more immediate concerns. West European leaders see themselves as fighting an increasingly untenable two-front war: a southern front against immigration and terrorism and an eastern front against Russia.

“ The eastern front is largely a project of policy establishments that see it as essential to maintaining Europe’s postwar order. Voters are more skeptical; a 2015 Pew poll found that slight majorities in France, Germany and Italy said their countries should not uphold their treaty obligation to defend an eastern NATO ally should it be attacked by Russia. Voters, particularly those on the right, have long seen southern issues — terrorism and immigration — as more important. Their threats to install far-right governments that would dismantle the European project entirely are increasingly credible. . . .”

The broadcast concludes with a look at Rex W. Tillerson, the CEO of Exxon Mobil, chosen by Trump to be Secretary of State. Tillerson is opposed to maintaining sanctions against Russia: ” . . . . At the center of the debate are questions about Mr. Tillerson’s vocal opposition to American sanctions imposed on Russia as he pursued oil and gas deals in that country. . . .” This too, is resonant with corporate Germany’s wishes as set forth in FTR #’s 918 and 919. Again, corporate Germany is dominated by the Bormann network.

We conclude with a recap of the Bormann capital network’s influence within Standard Oil of New Jersey (Exxon was formerly Standard of New Jersey, now merged with Mobil, Standard of New York.) ” . . .Vastly diversified, it is said to be the largest land-owner in South America, and through stockholdings, controls German heavy industry and the trust established by the late Hermann Schmitz, former president of I.G. Farben, who held as much stock in Standard Oil of New Jersey as did the Rockefellers. . . .”

Program Highlights Include: A recap of elementary features of German Ostpolitik; a synopsis of the OUN/B and its World War II and post-World War II operations; a synopsis of the information indicating Russia was not behind the high-profile hacks for which it has been punished.